Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
With the rising demand for E-commerce, Social Networking websites, it has become
essential to develop security protocols over the World Wide Web that can provide security …
essential to develop security protocols over the World Wide Web that can provide security …
A novel architecture for web-based attack detection using convolutional neural network
A Tekerek - Computers & Security, 2021 - Elsevier
Unprotected Web applications are vulnerable places for hackers to attack an organization's
network. Statistics show that 42% of Web applications are exposed to threats and hackers …
network. Statistics show that 42% of Web applications are exposed to threats and hackers …
[HTML][HTML] A data taxonomy for adaptive multifactor authentication in the internet of health care things
T Suleski, M Ahmed - Journal of Medical Internet Research, 2023 - jmir.org
The health care industry has faced various challenges over the past decade as we move
toward a digital future where services and data are available on demand. The systems of …
toward a digital future where services and data are available on demand. The systems of …
Web application firewall using machine learning and features engineering
A Shaheed, MHDB Kurdy - Security and Communication …, 2022 - Wiley Online Library
Web application security has become a major requirement for any business, especially with
the wide web attacks spreading despite the defensive measures and the continuous …
the wide web attacks spreading despite the defensive measures and the continuous …
Hybrid unsupervised web-attack detection and classification–A deep learning approach
S Pillai, A Sharma - Computer Standards & Interfaces, 2023 - Elsevier
Web requests made by users of web applications are manipulated by hackers to gain control
of web servers. Moreover, detecting web attacks has been increasingly important in the …
of web servers. Moreover, detecting web attacks has been increasingly important in the …
Detecting cyberattacks on electrical storage systems through neural network based anomaly detection algorithm
Distributed Energy Resources (DERs) are growing in importance Power Systems. Battery
Electrical Storage Systems (BESS) represent fundamental tools in order to balance the …
Electrical Storage Systems (BESS) represent fundamental tools in order to balance the …
Penerapan Keamanan Login Admin Dan Filterisasi Input Untuk Mencegah SQL Injection
Y Ferdianto - Jurnal Informatika dan Rekayasa Perangkat Lunak, 2023 - jim.teknokrat.ac.id
Dalam industri teknologi informasi, situs web sering menjadi sasaran serangan oleh peretas
dengan berbagai macam cara untuk mengakali keamanan situs web tersebut. Serangan …
dengan berbagai macam cara untuk mengakali keamanan situs web tersebut. Serangan …
[PDF][PDF] A study on remote code execution vulnerability in web applications
The popularity of web applications is growing faster due to fulfil the requirements of the
business and satisfy the needs of consumers. Web applications are now being capable in …
business and satisfy the needs of consumers. Web applications are now being capable in …
Toward a readiness model for secure software coding
The heart of the application's secure operation is its software code. If the code contains
flaws, the entire program might be hacked. The issue with software vulnerabilities is that they …
flaws, the entire program might be hacked. The issue with software vulnerabilities is that they …
Descriptive Analysis of Built-in Security Features in Web Development Frameworks
Many challenges are facing modern web applications, and security is a major concern for
web applications developers especially when today's web applications are interactive and …
web applications developers especially when today's web applications are interactive and …